From f00b07dad3f8dae3068eb1cf955d5bf914cd591a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tomas=20Daba=C5=A1inskas?= Date: Fri, 20 Jun 2025 09:59:12 +0300 Subject: [PATCH] fix(transport): change rate limit log messages from DEBUG to WARN level MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Rate limiting and abuse detection are important operational events that should be more visible than debug level logging. These conditions indicate potential issues with API usage patterns that operators should be aware of. Signed-off-by: Tomas DabaĊĦinskas --- github/transport.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/github/transport.go b/github/transport.go index d091fc01bd..4c4b4f1b08 100644 --- a/github/transport.go +++ b/github/transport.go @@ -91,7 +91,7 @@ func (rlt *RateLimitTransport) RoundTrip(req *http.Request) (*http.Response, err if arlErr, ok := ghErr.(*github.AbuseRateLimitError); ok { rlt.nextRequestDelay = 0 retryAfter := arlErr.GetRetryAfter() - log.Printf("[DEBUG] Abuse detection mechanism triggered, sleeping for %s before retrying", + log.Printf("[WARN] Abuse detection mechanism triggered, sleeping for %s before retrying", retryAfter) time.Sleep(retryAfter) rlt.smartLock(false) @@ -101,7 +101,7 @@ func (rlt *RateLimitTransport) RoundTrip(req *http.Request) (*http.Response, err if rlErr, ok := ghErr.(*github.RateLimitError); ok { rlt.nextRequestDelay = 0 retryAfter := time.Until(rlErr.Rate.Reset.Time) - log.Printf("[DEBUG] Rate limit %d reached, sleeping for %s (until %s) before retrying", + log.Printf("[WARN] Rate limit %d reached, sleeping for %s (until %s) before retrying", rlErr.Rate.Limit, retryAfter, time.Now().Add(retryAfter)) time.Sleep(retryAfter) rlt.smartLock(false)